Vulnerability & Exploit Database

Try Surface Command Get a continuous 360° view of your attack surface

A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. The exploits are all included in the Metasploit framework. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 5,981 - 6,000 of 6,066 in total
SSH Key Persistence
Created: February 17, 2020
module
Explore
Sticky Keys Persistence Module
Created: May 30, 2018
module
Explore
Windows Manage VMDK Mount Drive
Created: May 30, 2018
module
Explore
Windows Manage Volume Shadow Copies
Created: January 08, 2021
module
Explore
Windows Post Manage WDigest Credential Caching
Created: May 30, 2018
module
Explore
Windows Recon Computer Browser Discovery
Created: May 30, 2018
module
Explore
PHP Base64 Encoder
Created: May 30, 2018
module
Explore
Windows Outbound-Filtering Rules
Created: May 30, 2018
module
Explore
Windows Gather Wireless Current Connection Info
Created: May 30, 2018
module
Explore
Windows Gather Wireless Profile
Created: May 30, 2018
module
Explore
Zutto Dekiru
Created: May 30, 2018
module
Explore
XOR Encoder
Created: May 30, 2018
module
Explore
Dynamic Key XOR Encoder
Created: March 19, 2019
module
Explore
IP Board Login Auxiliary Module
Created: May 30, 2018
module
Explore
SMTP Simple Fuzzer
Created: May 30, 2018
module
Explore
Joomla Page Scanner
Created: May 30, 2018
module
Explore
Call+4 Dword XOR Encoder
Created: May 30, 2018
module
Explore
HTTPS Fetch, Linux Command Shell, Reverse TCP Inline
Created: February 20, 2025
module
Explore
HTTPS Fetch, Reverse SCTP Stager
Created: May 18, 2023
module
Explore
HTTPS Fetch, Bind TCP Stager
Created: June 15, 2023
module
Explore